Authenticity |
Are you really who you say you are? |
secret keys, biometrics |
Confidentiality |
Is information secure and privacy protected? |
cryptography |
Data Integrity |
Can the data be changed or corrupted? |
hashing |
Access control |
Will the information be accessed only by authorized parties? |
access control lists, role based security |
Availability |
Will the information be available when needed? |
disaster planning, recovering from crack attack, clustering, data backup/redundancy |
Non repudiation |
what is the proof of a digital transaction? |
digital signatures |